• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

对简化轮数的TinyJAMBU的魔方攻击

Cube attacks on round-reduced TinyJAMBU.

作者信息

Teng Wil Liam, Salam Iftekhar, Yau Wei-Chuen, Pieprzyk Josef, Phan Raphaël C-W

机构信息

School of Computing and Data Science, Xiamen University Malaysia, Sepang, 43900, Malaysia.

Data61, Commonwealth Scientific and Industrial Research Organisation, Marsfield, NSW, 2122, Australia.

出版信息

Sci Rep. 2022 Mar 29;12(1):5317. doi: 10.1038/s41598-022-09004-3.

DOI:10.1038/s41598-022-09004-3
PMID:35351928
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8964795/
Abstract

Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such as IoT. To meet the challenge, the National Institute of Standards and Technology (NIST) announced the Lightweight Cryptography (LWC) project. One of the finalists of the project is the TinyJAMBU cipher. This work evaluates the security of the cipher. The tool used for the evaluation is the cube attack. We present five distinguishing attacks DA1-DA5 and two key recovery attacks KRA1-KRA2. The first two distinguishing attacks (DA1 and DA2) are launched against the initialisation phase of the cipher. The best result achieved for the attacks is a distinguisher for an 18-bit cube, where the cipher variant consists of the full initialisation phase together with 438 rounds of the encryption phase. The key recovery attacks (KRA1 and KRA2) are also launched against the initialisation phase of the cipher. The best key recovery attack can be applied for a cipher variant that consists of the full initialisation phase together with 428 rounds of the encryption phase. The attacks DA3-DA5 present a collection of distinguishers up to 437 encryption rounds, whose 32-bit cubes are chosen from the plaintext, nonce, or associated data bits. The results are confirmed experimentally. A conclusion from the work is that TinyJAMBU has a better security margin against cube attacks than claimed by the designers.

摘要

随着连接到互联网的物联网(IoT)设备数量的增加,轻量级密码学最近变得越来越重要。其主要目标是提供能够在诸如物联网等资源受限环境中高效运行的加密算法。为应对这一挑战,美国国家标准与技术研究院(NIST)宣布了轻量级密码学(LWC)项目。该项目的决赛入围者之一是TinyJAMBU密码。这项工作评估了该密码的安全性。用于评估的工具是立方攻击。我们提出了五种区分攻击DA1 - DA5和两种密钥恢复攻击KRA1 - KRA2。前两种区分攻击(DA1和DA2)是针对该密码的初始化阶段发起的。这些攻击取得的最佳结果是一个针对18位立方的区分器,其中密码变体包括完整的初始化阶段以及438轮加密阶段。密钥恢复攻击(KRA1和KRA2)也是针对该密码的初始化阶段发起的。最佳的密钥恢复攻击可应用于一个密码变体,该变体包括完整的初始化阶段以及428轮加密阶段。攻击DA3 - DA5展示了一系列多达437轮加密的区分器,其32位立方是从明文、初始向量或关联数据位中选取的。实验结果证实了这些结果。这项工作得出的一个结论是,TinyJAMBU在抵御立方攻击方面具有比设计者声称的更好的安全边际。

相似文献

1
Cube attacks on round-reduced TinyJAMBU.对简化轮数的TinyJAMBU的魔方攻击
Sci Rep. 2022 Mar 29;12(1):5317. doi: 10.1038/s41598-022-09004-3.
2
BRISK: Dynamic Encryption Based Cipher for Long Term Security.BRISK:基于动态加密的长期安全密码。
Sensors (Basel). 2021 Aug 26;21(17):5744. doi: 10.3390/s21175744.
3
On the resistance of new lightweight block ciphers against differential cryptanalysis.论新型轻量级分组密码对差分密码分析的抗性
Heliyon. 2023 Apr 6;9(4):e15257. doi: 10.1016/j.heliyon.2023.e15257. eCollection 2023 Apr.
4
A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices.基于 Salsa20 的轻量级密码算法在资源受限的物联网设备中的应用。
Sensors (Basel). 2018 Oct 4;18(10):3326. doi: 10.3390/s18103326.
5
A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things.一种用于边缘计算和物联网的基于椭圆曲线密码体制的安全高效方案。
Sensors (Basel). 2020 Oct 29;20(21):6158. doi: 10.3390/s20216158.
6
Weak-keys and key-recovery attack for [Formula: see text].针对 [公式:见文本] 的弱密钥和密钥恢复攻击。
Sci Rep. 2022 Sep 29;12(1):16313. doi: 10.1038/s41598-022-19046-2.
7
A practical key recovery attack on the lightweight WG-5 stream cipher.对轻量级WG-5流密码的一种实用密钥恢复攻击。
Heliyon. 2024 Jan 11;10(2):e24197. doi: 10.1016/j.heliyon.2024.e24197. eCollection 2024 Jan 30.
8
A Secure IoT-Based Irrigation System for Precision Agriculture Using the Expeditious Cipher.基于快速密码的物联网安全灌溉系统在精准农业中的应用。
Sensors (Basel). 2023 Feb 13;23(4):2091. doi: 10.3390/s23042091.
9
Chaos-Based Lightweight Cryptographic Algorithm Design and FPGA Implementation.基于混沌的轻量级密码算法设计与FPGA实现
Entropy (Basel). 2022 Nov 4;24(11):1610. doi: 10.3390/e24111610.
10
Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction.基于关键词摘要提取的动态轮次混沌分组密码
Entropy (Basel). 2018 Sep 11;20(9):693. doi: 10.3390/e20090693.

引用本文的文献

1
Weak-keys and key-recovery attack for [Formula: see text].针对 [公式:见文本] 的弱密钥和密钥恢复攻击。
Sci Rep. 2022 Sep 29;12(1):16313. doi: 10.1038/s41598-022-19046-2.